Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
5881e379bcd6046860899915114f0d52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5881e379bcd6046860899915114f0d52.exe
Resource
win10v2004-20231215-en
General
-
Target
5881e379bcd6046860899915114f0d52.exe
-
Size
11.9MB
-
MD5
5881e379bcd6046860899915114f0d52
-
SHA1
0e42cecfebbfd8b29105d541f05c1a2b3c5a3fa4
-
SHA256
f48c21d8ae4946152edbc013645da8f5141b987994b9209ba6017411fddd5c7c
-
SHA512
89c4e81f6d89f558596b8818a7fd140bcf47db1bd3e4cc941cb4ed20b1865268ca564bac5fdaab527a4e25e6ae93eadf71a2a604611e613a6e35e9ddbfd36476
-
SSDEEP
49152:4ckGb2222222222222222222222222222222222222222222222222222222222H:4ck
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2924 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\tqynpieg\ImagePath = "C:\\Windows\\SysWOW64\\tqynpieg\\duqxonrv.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 5881e379bcd6046860899915114f0d52.exe -
Deletes itself 1 IoCs
pid Process 3164 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4488 duqxonrv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4488 set thread context of 3164 4488 duqxonrv.exe 107 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2464 sc.exe 2816 sc.exe 4468 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2000 3152 WerFault.exe 87 4528 4488 WerFault.exe 102 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3152 wrote to memory of 3680 3152 5881e379bcd6046860899915114f0d52.exe 91 PID 3152 wrote to memory of 3680 3152 5881e379bcd6046860899915114f0d52.exe 91 PID 3152 wrote to memory of 3680 3152 5881e379bcd6046860899915114f0d52.exe 91 PID 3152 wrote to memory of 4900 3152 5881e379bcd6046860899915114f0d52.exe 93 PID 3152 wrote to memory of 4900 3152 5881e379bcd6046860899915114f0d52.exe 93 PID 3152 wrote to memory of 4900 3152 5881e379bcd6046860899915114f0d52.exe 93 PID 3152 wrote to memory of 2464 3152 5881e379bcd6046860899915114f0d52.exe 96 PID 3152 wrote to memory of 2464 3152 5881e379bcd6046860899915114f0d52.exe 96 PID 3152 wrote to memory of 2464 3152 5881e379bcd6046860899915114f0d52.exe 96 PID 3152 wrote to memory of 2816 3152 5881e379bcd6046860899915114f0d52.exe 98 PID 3152 wrote to memory of 2816 3152 5881e379bcd6046860899915114f0d52.exe 98 PID 3152 wrote to memory of 2816 3152 5881e379bcd6046860899915114f0d52.exe 98 PID 3152 wrote to memory of 4468 3152 5881e379bcd6046860899915114f0d52.exe 99 PID 3152 wrote to memory of 4468 3152 5881e379bcd6046860899915114f0d52.exe 99 PID 3152 wrote to memory of 4468 3152 5881e379bcd6046860899915114f0d52.exe 99 PID 3152 wrote to memory of 2924 3152 5881e379bcd6046860899915114f0d52.exe 101 PID 3152 wrote to memory of 2924 3152 5881e379bcd6046860899915114f0d52.exe 101 PID 3152 wrote to memory of 2924 3152 5881e379bcd6046860899915114f0d52.exe 101 PID 4488 wrote to memory of 3164 4488 duqxonrv.exe 107 PID 4488 wrote to memory of 3164 4488 duqxonrv.exe 107 PID 4488 wrote to memory of 3164 4488 duqxonrv.exe 107 PID 4488 wrote to memory of 3164 4488 duqxonrv.exe 107 PID 4488 wrote to memory of 3164 4488 duqxonrv.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\5881e379bcd6046860899915114f0d52.exe"C:\Users\Admin\AppData\Local\Temp\5881e379bcd6046860899915114f0d52.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tqynpieg\2⤵PID:3680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\duqxonrv.exe" C:\Windows\SysWOW64\tqynpieg\2⤵PID:4900
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tqynpieg binPath= "C:\Windows\SysWOW64\tqynpieg\duqxonrv.exe /d\"C:\Users\Admin\AppData\Local\Temp\5881e379bcd6046860899915114f0d52.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2464
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tqynpieg "wifi internet conection"2⤵
- Launches sc.exe
PID:2816
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tqynpieg2⤵
- Launches sc.exe
PID:4468
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 6682⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\tqynpieg\duqxonrv.exeC:\Windows\SysWOW64\tqynpieg\duqxonrv.exe /d"C:\Users\Admin\AppData\Local\Temp\5881e379bcd6046860899915114f0d52.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 5162⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3152 -ip 31521⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4488 -ip 44881⤵PID:5072
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD51054d5c53539875e4f14cb7639c97fc5
SHA1b561d8d90091a98aaa09d517589de4d35a871219
SHA25602ff7d9422689b3a75fa69e944775d7c4797ec5b73d837ad1d726718690fb8fc
SHA512c2960948d6c11a0ad6019ae02d48eb6456e12061e2b8b53b0f35c0992e0187e80d10d3dd2b5c9493b508eaa16fc284d5ff8071e06037c18d140173715b71e4f9
-
Filesize
555KB
MD5668d6b7d7825aa7c5c104ab92f390071
SHA1f50498251e9a323e27cae6bf38bbe83da949ebc4
SHA256ed0092cbbb7ad845e121fbcd9e03b5e37d6e9386241cc2b0441a9eb85e9740cb
SHA5124fd2e122e3e1af34bb7f5efbf04dd589ca91a94ad7a9721afa52b6fa3b3cd7580ee3e08eacc8274c16a68d3d1eb9aa9118d619247e4b6ef078c96899fffee7bb